Hi [[ session.user.profile.firstName ]]

Ransomware in Healthcare

The business model behind crimeware has changed. As the price of stolen records has plummeted, many attackers looking for new sources of income. Many attackers have turned to ransomware due to recent advances in attack distribution, anonymous payments, and the ability to reliably encrypt and decrypt data.

Join this informative webinar where a former Information Security Lead at a hospital, will discuss practical steps healthcare organizations can take to stop ransomware. Drawing from his first-hand experience responding to ransomware, combined with recommendations from the FBI, Matt will cover practical steps healthcare organizations can take on systems and network devices to prevent exposure to this rampant attack.

Register today to learn more about:

• How the most current variants of ransomware work
• How to prevent successful ransomware attacks in Healthcare

.
Recorded Oct 20 2016 46 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Matt Mellen - Security Architect & Healthcare Solution Lead - Palo Alto Networks
Presentation preview: Ransomware in Healthcare
  • Channel
  • Channel profile
  • URL Filtering Best Practices - Las Políticas de Seguridad Web a tu Servicio Mar 25 2020 10:00 am UTC 60 mins
    Marçal Balasch
    A medida que los atacantes evolucionan, las organizaciones requieren una mayor flexibilidad que va más allá de la categorización binaria tradicional y las políticas para URL. Con el lanzamiento de PanOS 9.0, hemos agregado nuevas y potentes capacidades a nuestro servicio de filtrado de URL para ayudar a mantener a los usuarios seguros sin complicar sus políticas de seguridad.

    Únete a nuestros expertos que te proporcionarán recomendaciones de las mejores prácticas relacionadas con el filtrado URL. Te enseñaremos cómo puedes prevenir ataques exitosos cuando quieras:
    - Activar el descifrado selectivo de SSL
    - Habilitar la protección contra el robo de credenciales
    - Utilizar acciones automatizadas

    Lleva tu política de seguridad web más allá de la clasificación los sitios web y conviértela en un componente crítico de vuestra estrategia de seguridad. Únete a nosotros para obtener información y respuestas a tus preguntas sobre seguridad web.
  • URL Filtreleme ile İlgili En İyi Uygulamalar Mar 20 2020 8:00 am UTC 60 mins
    İbrahim Eskiocak
    Saldırganlar yöntemlerini geliştirip ilerledikçe kuruluşlar, URL'ler için geleneksel ikili sınıflandırma ve kuralların ötesinde daha fazla esnekliğe ihtiyaç duyar hale geldi. PanOS'in son sürümü (9.0) ile URL Filtreleme hizmetimize, güvenlik kurallarınızı karmaşıklaştırmadan kullanıcılarınızı güvende tutmaya yardımcı olacak güçlü, yeni özellikler ekledik.

    Risk, çoklu kategori ve kural aksiyonları ile ilgili en iyi uygulama önerilerini sunan uzmanlarımıza katılarak başarılı saldırıları nasıl önleyeceğinizi görebilirsiniz:
    - Seçmeli SSL trafiği çözme özelliğini etkinleştirme
    - Kimlik bilgileri hırsızlığı korumasını etkinleştirme
    - Otomatik aksiyonlardan yararlanma

    Web güvenliği kurallarınızı web sitelerini sınıflandırmanın ötesine taşıyıp güvenlik stratejinizin önemli bir bileşeni haline getirmek, Web güvenliği hakkında bilgi edinmek ve sorularınızın yanıtlarına ulaşmak için bize katılın.
  • URL Filtering Best Practice - Come Creare Web Security Policy Funzionali Mar 18 2020 10:00 am UTC 60 mins
    Pamela Ancel Juachon
    Data la rapida evoluzione degli hacker, le aziende necessitano di una maggiore flessibilità che va oltre la tradizionale categorizzazione e policy per URL. Con il rilascio di PanOS 9.0, abbiamo aggiunto nuove capacità potenziate al nostro servizio di URL filtering per mantenere protetti gli utenti utenti senza complicare le policy di sicurezza.

    Unisciti ai nostri esperti che ti illustreranno le best practice relative a risk, multi-category e policy action. Ti mostreremo come prevenire gli attacchi grazie alle funzioni di:
    - Selective SSL decryption
    - Credential Theft Prevention
    - Automated action

    Con Palo Alto Networks potrai portare la web security oltre la semplice categorizzazione dei siti web e trasformarla in una componente chiave per la strategia di security della tua organizzazione. Partecipa al webinar per trovare le risposte alle domande più importanti riguardo la web security.
  • NGFW Configuration Hardening - Part 1 Mar 18 2020 8:00 am UTC 60 mins
    Othman Amarneh
    According to research, almost 95% of cybersecurity incidents/attacks are due to misconfiguration in the security solutions the organizations have. Accordingly, having a solid and hardened configuration is a requirement to improve the organization's security posture.

    In this webinar, we will discuss some of the hardening and best practice configurations to apply to Palo Alto Networks NGFW which will help your organization to reduce the attack surface.
  • Развеиваем мифы о реализации Zero Trust Mar 17 2020 9:00 am UTC 60 mins
    Денис Батранков
    Один из мифов, который есть про Zero Trust, что его сложно и дорого реализовать. Неверно! В нашем вебинаре, который проводит Денис Батранков, будет рассказано о подходе Zero Trust и как его реализовать.

    Подключютесь к вебинару и узнайте:
    - Как пошагово реализовать Zero Trust и избежать прекращения работы сервисов
    - Пять ключевых шагов реализации
    - Почему Zero Trust хорошая метрика для измерения безопасности и зрелости службы ИБ в компани
  • Machine Learning 101: Dinamiza la seguridad y mejora tu tiempo de respuesta Mar 13 2020 10:00 am UTC 60 mins
    Jesus Diaz Barrero
    El machine learning, como disciplina de la Inteligencia Artificial, está cambiando el modo en el que vivimos. Es capaz de reducir drásticamente los errores humanos y conseguir ejecutar con efectividad tareas que manualmente parecen imposibles.

    Sí, pero, ¿cómo cambia el panorama de la Ciberseguridad? Y, además y probablemente más importante, cómo impactará tu camino en la ciberseguridad?

    Únete a nuestro experto Jesus Diaz Barrero para comprender cómo aplicar el machine learning en las tareas de threat hunting y análisis de malware.

    Regresarás conociendo:

    -En dónde se aplica hoy día el machine learning
    -Cómo será aprovechado en el futuro
    -Cómo puedes simplificar tus operaciones de seguridad gracias al machine learning y el automatismo.
  • Machine Learning 101: Streamline Security and Improve Response Time Mar 10 2020 11:00 am UTC 39 mins
    Harri Ruuttila
    Machine learning is changing the way we live our lives. It can reduce errors and even achieve the impossible by accomplishing tasks that cannot be performed manually.

    But how does it change the cybersecurity landscape? And, perhaps more importantly, how will it impact your career in security?

    You will come away understanding:

    -Where machine learning is used today in security
    -How it will be leveraged in the future
    -How you can simplify security operations with automation and machine learning
  • Cortex XDR 2.0 - Neue Funktionen & Öffnung der Cortex-Plattform für 3rd Party Fi Mar 10 2020 10:00 am UTC 48 mins
    Dirk Thelen und Bastian Schwittay
    Security Teams stehen heutzutage vor gewaltigen Herausforderungen - in Silos agierende Sicherheitssysteme generieren Unmengen von Alarmen ohne den notwendigen Kontext, um Angriffe schnell und umfassend erkennen, verstehen und stoppen zu können. Cortex XDR setzt diesem Dilemma einen neuartigen Ansatz entgegen, der auf der Analyse reichhaltiger, integrierter Daten über Endpunkte, Netzwerk und Cloud hinweg basiert - als erste XDR-Plattform für sichere Prävention, automatisierte Erkennung und schnelle Untersuchung und Eindämmung von Cyberangriffen.

    In diesem Webinar stellen Ihnen Bastian Schwittay und Dirk Thelen vor, wie die neue Version 2.0 von Cortex XDR mit der Einbindung von Daten aus Drittquellen, einem vollkommen neuen Device Control-Modul und umfassend verbessertem Benutzerinterface einen weiteren Meilenstein erreicht und die Messlatte für XDR ein weiteres Mal erheblich höher gelegt hat. Außerdem geben wir Ihnen einen Einblick in die neue Lizenzierung.
  • Windows 7 End-of-Life: What to Do If You Can’t Upgrade Your Systems Mar 3 2020 10:00 am UTC 60 mins
    Shahar Razon and Aviel Fogel
    Now that Windows 7 has reached its end-of-life date, you might be wondering if your Windows 7 PCs increase your risk of an attack. The simple answer is yes. Because Windows 7 systems will no longer receive software patches or security updates, any unsupported Windows 7 PCs in your network could become the entry point for a damaging attack.

    Unfortunately, legacy systems lurk in many corporate networks. Extended security update programs can offer a temporary—and costly—stopgap, but security leaders must consider other approaches to protect all their unsupported systems from exploits.

    Join security experts Shahar Razon and Aviel Fogel as they discuss:

    -The top risks for Windows 7 systems
    -Why older operating systems are inherently less secure
    -Strategies to secure legacy systems from exploits and malware
  • Policy Optimizer—Strengthen your security rule set and save time Feb 27 2020 11:00 am UTC 62 mins
    Mandeep Singh Sandhu and Scott Johanson, with Host Karin Shopen
    App-ID increases the value of our next-generation firewalls by making it easier and faster to determine the exact identity of applications traversing the network, enabling teams to set and enforce the right policies.

    Join Palo Alto Networks experts and learn how you can use the New Policy Optimizer capability to migrate your legacy rule set to App-ID based rules.

    In this session, you will:
    •Learn best practices for rule management
    •Find out how Policy Optimizer can help you achieve a more secure and easier to manage security rule set
    •Learn how App-ID can reduce complexity and minimize human error, the leading cause of data breaches
    •Get your questions answered in our live Q&A
  • Desmontando mitos en la implementación Zero Trust Feb 26 2020 10:00 am UTC 60 mins
    Diego Gonzalez Alicante
    Uno de los mitos sobre el Zero Trust es que es muy difícil y costoso de implementar. Para nada!! En este webinar desmontaremos este mito de una vez.

    Unase en este webinar y aprenderá:
    - Cómo implementar de una manera simple Zero Trust utilizando una aproximación iterativa diseñada para evitar impacto.
    - Los 5 pasos claves de la implementación
    - Por qué Zero Trust es simple de medir, especialmente cuando usamos métricas maduras.
  • 4 Life Hacks to Love Your Security Job (From Elements of Security Operations) Feb 25 2020 6:00 pm UTC 60 mins
    Kerry Matre, Author, Elements of Security Operations; Kasey Cross, Sr. Product Marketing Manager
    As a security analyst, you have the seemingly enviable job of finding and stopping cyber attackers. In reality, you spend too much time sifting through false positives and low-fidelity data and can’t remember the last time you could fully focus on hunting real threats to the business!

    We can help. We’ve analyzed hundreds of SOCs to develop a blueprint for efficient and scalable security operations. Featuring the author of “Elements of Security Operations”, this webinar will teach you how to cut down repetitive tasks, spend more time investigating incidents and hunt for hidden threats.

    Join this webinar to learn:
    4 life hacks that will make your security job easier
    The secrets to effective security operations
    How you can automate so you focus on valuable and interesting tasks
    How to to prevent burnout by simplifying security operations


    Attend this webinar and learn strategies that can improve your security outcomes and job satisfaction at the same time!
  • SSL-Entschlüsselung: Stärkere Sicherheit, bessere Sichtbarkeit Recorded: Feb 21 2020 55 mins
    Jens Egger
    In den letzten Jahren ist der Umfang des verschlüsselten Datenverkehrs deutlich gestiegen. Leider bietet dies neben den offensichtlichen Vorteilen der Verschlüsselung auch die Möglichkeit, böswillige Aktivitäten zu verbergen, was die Notwendigkeit einer effektiven Entschlüsselung noch dringender macht.

    Zusammen mit unserem Experten Jens Egger werfen wir einen genaueren Blick auf folgende Themen:

    - Innovationen in PAN-OS® 9.0 zur Optimierung der SSL-Entschlüsselung
    - Best-Practices und eine vollständige Übersicht über Protokolle wie HTTP/2
    - Die richtige Strategie zur Implementierung der SSL-Entschlüsselung
  • Secure your Mobile Users, Branch Offices, and SaaS Applications Recorded: Feb 19 2020 43 mins
    Darren D'Arcy, Issam Aouad Tabet, and Marina Daniela Costache
    To secure your Cloud-enabled organization, you need to have a cloud-delivered security mindset. This is achieved through enabling secure access, protecting users & applications, and controlling data from anywhere.

    Join our Webinar to learn more about:

    - Securing your mobile users and branch offices with Prisma Access designed for SASE
    - Providing visibility and control for your SaaS applications through Prisma SaaS
    - Your cloud environment design best practices and use case
  • Sécurisez vos utilisateurs nomades, vos succursales et vos applications SaaS Recorded: Feb 19 2020 55 mins
    Alaa Riahi, Aurélien Bihel, and Quentin Hidderley
    Afin de sécuriser votre environnement Cloud d'entreprise, il est nécessaire d'avoir à l'esprit l'ensemble des problématiques propres aux infrastructures Cloud. Cela va de la garantie d'un accès sécurisé, en protégeant tant les utilisateurs que les applications, au contrôle même des données, quelles que soient leurs localisations.

    Joignez-vous à nous pour ce Webinar afin de découvrir notre approche concernant :

    - La sécurisation des utilisateurs et sites distants grâce à Prisma Access, conçu comme SASE,
    - L'amélioration de la visibilité et du contrôle des applications SaaS au travers de Prisma SaaS,
    - Les bonnes pratiques applicables au Cloud à l'aide de scenarii usuels.
  • Machine Learning 101: comment la machine intervient en cybersécurité Recorded: Feb 18 2020 41 mins
    Bertrand Le Bail
    Machine Learning change la façon dont nous vivons nos vies. Il peut réduire les erreurs et même réaliser l'impossible en accomplissant des tâches qui ne peuvent pas être effectuées manuellement.

    Mais comment cela change-t-il le paysage de la cybersécurité? Et, peut-être plus important encore, comment cela affectera-t-il votre carrière dans la sécurité?

    Rejoignez notre expert Bertrand pour comprendre comment appliquer les techniques de Machine Learning dans le contexte de la chasse aux menaces et à l'analyse des logiciels malveillants.

    Vous repartirez en comprenant:

    -Où le Machine Learning est utilisé aujourd'hui dans la sécurité
    -Comment il sera exploité à l'avenir
    -Comment simplifier les opérations de sécurité avec l'automatisation et le Machine Learning
  • Middle-East Cloud Regulations Explained Recorded: Feb 17 2020 64 mins
    Haider Pasha
    Cloud regulations in the region can be difficult to understand and more often than not, we tend to make assumptions or accept the myths from what we hear in the market. Join us for this webinar where we demystify the common assumptions businesses make around cloud regulations.

    We will cover regulations in Saudi Arabia and UAE and will be joined by Partners from Al Tamimi group, a reputable law firm based in the UAE with operations in Saudi Arabia. The focus will be to cover the definition of cloud and data followed by discussing the various industries and the local data laws that apply, clarifying what is acceptable and what is not when transferring data to the cloud.
  • Allez au delà du filtrage URL tout en optimisant votre temps Recorded: Feb 12 2020 68 mins
    Damien Raynal
    Le type des attaques évolue sans cesse, et les entreprises devant leur transformation digitale doivent s’adapter à leurs nouveaux besoins. Avec la nouvelle version 9.1 nous accompagnons nos clients en créant de nouvelles fonctionnalités de filtrage URL afin de sécurisé le surf des utilisateurs sans complexifier la politique de sécurité.

    Rejoignez nos experts lors de cette session, ils seront à même de vous accompagner, expliquer, les bonnes pratiques des politiques de sécurité. Nous vous ferons une démonstration de comment arrêter les attaques avec :

    - L’activation du déchiffrement SSL
    - L’activation de protection contre le vole de login & mot de passe
    - Utiliser les actions d’automatisations

    Cela vous permettra d’aller bien au dela de juste la catégorisation d’url, et d’alleger votre temps de réponse tout en gagne en visibilité. Rejoignez nous pour cette session de question réponse.
  • PanOS 9.1 - SD-Wan und mehr Recorded: Feb 7 2020 57 mins
    Dirk Thelen und Rene Fleissner
    Seit Dezember 2019 ist die neue Version von PanOS verfügbar. Ein Hauptaugenmerk wurde hier auf SD-Wan gesetzt.

    Sichere Vernetzung und Kostenoptimierung Ihrer Standorte bei der Verbindung zu den businessrelevanten Diensten stellen für viele Unternehmen eine Herausforderung dar. Mit SD-Wan zeigt Palo Alto Networks, SD-Wan muss nicht kompliziert sein und auch keine Einbußen bei Security bedeuten.

    Die Security Spezialisten Dirk Thelen und Rene Fleissner-Lichtel zeigen die Möglichkeiten von SD-WAN für Ihr Unternehmen. Zusätzlich bringt PanOS 9.1 einige neue Features, auf die auch eingegangen wird.
  • Build security into CI/CD pipelines for effective automation on Azure Recorded: Feb 6 2020 48 mins
    David MacLean
    Realizing “DevSecOps” and effectively implementing security into your CI/CD pipelines on Azure remains a challenging proposition for most organizations today.

    In this session, we share the essential principles to achieve security automation in your CI/CD pipelines and across the build, deploy and run phases of your applications.

    Finally, we conclude with a demonstration of security automation across all three phases of your applications deployed on Azure infrastructure - showing you how to bring security automation to your organization today.
Webcasts and Videos
Palo Alto Networks is the next-generation security company, leading a new era in cybersecurity by safely enabling applications and preventing cyber breaches for tens of thousands of organizations worldwide. Built with an innovative approach and highly differentiated cyberthreat prevention capabilities, our game-changing security platform delivers security far superior to legacy or point products, safely enables daily business operations, and protects an organization's most valuable assets. Find out more at www.paloaltonetworks.com or call us at 1-877-524-1031.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Ransomware in Healthcare
  • Live at: Oct 20 2016 6:00 pm
  • Presented by: Matt Mellen - Security Architect & Healthcare Solution Lead - Palo Alto Networks
  • From:
Your email has been sent.
or close